Computer Security
-
-
Standardized
- The MSP’s Guide to Avoiding Lawsuits, Scaling Compliance, and Winning High-Value Clients
- Auteur(s): Bruce McCully
- Narrateur(s): Bruce McCully
- Durée: 4 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The MSPs that are dominating the market aren’t selling IT anymore. They’re selling protection—protection from regulators, cyber insurance denials, and lawsuits that are wiping out businesses like yours. Standardized: The MSP’s Guide to Avoiding Lawsuits, Scaling Compliance, and Winning High-Value Clients isn’t theory—it’s a battle-tested blueprint for turning compliance into a scalable, profitable service that keeps clients loyal and lawyers off your back.
-
Standardized
- The MSP’s Guide to Avoiding Lawsuits, Scaling Compliance, and Winning High-Value Clients
- Narrateur(s): Bruce McCully
- Durée: 4 h et 6 min
- Date de publication: 2025-07-10
- Langue: Anglais
-
If you think compliance is a checkbox, you’ve already lost. If you’re still leading with security tools, you’re just another expense.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
How I Rob Banks
- And Other Such Places
- Auteur(s): FC
- Narrateur(s): Paul Brion
- Durée: 7 h et 5 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes.
-
-
Fantastic stories and amazing security tips
- Écrit par VIss_Tried le 2023-07-26
-
How I Rob Banks
- And Other Such Places
- Narrateur(s): Paul Brion
- Durée: 7 h et 5 min
- Date de publication: 2023-06-27
- Langue: Anglais
-
Renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Auteur(s): Sean D. Mack
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
An essential and up-to-date guide to DevSecOps....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: Computer Hacking Mastery
- Auteur(s): Robert Keane
- Narrateur(s): Mike Davis
- Durée: 1 h et 33 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
The world of hacking has changed so much in recent years. New attacks are being made, and learning how to protect your system can be more difficult than ever before. This guidebook has all the information that you need to learn about some of the most common attacks that are going on in the world today, as well as some of the things that you can do to protect yourself. Inside this guidebook, you will learn everything that you need to start your journey with hacking.
-
Hacking: Computer Hacking Mastery
- Narrateur(s): Mike Davis
- Durée: 1 h et 33 min
- Date de publication: 2017-12-20
- Langue: Anglais
-
Inside this guidebook, you will learn everything that you need to start your journey with hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Battle for Your Computer
- Israel and the Growth of the Global Cyber-Security Industry
- Auteur(s): Alon Arvatz
- Narrateur(s): Mitch Crawford
- Durée: 12 h et 32 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry, Israeli Defense Force (IDF) cyberwarfare veteran and tech product leader Alon Arvatz examines the "why" and the "how" of the extraordinarily strong connection between Israel's elite cyber military unit and that country's booming offensive and defensive cybersecurity industry. In the book, you'll explore the central role played by Israel in the global fight for cybersecurity supremacy.
-
The Battle for Your Computer
- Israel and the Growth of the Global Cyber-Security Industry
- Narrateur(s): Mitch Crawford
- Durée: 12 h et 32 min
- Date de publication: 2023-10-17
- Langue: Anglais
-
Israeli Defense Force (IDF) cyberwarfare veteran and tech product leader Alon Arvatz examines the "why" and the "how" of the extraordinarily strong connection between Israel's elite cyber military unit and that country's booming offensive and defensive cybersecurity industry....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Auteur(s): Raymond Phillips
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are considering this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step by step process and see yourself disappear from the big World Wide Web.
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Date de publication: 2016-12-14
- Langue: Anglais
- Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration. Learn how to conduct a Physical Red Team Operation with precision, confidence, and value. Whether the listener will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this audiobook is essential.
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Date de publication: 2019-12-10
- Langue: Anglais
-
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ransomware Protection Playbook
- Auteur(s): Roger A. Grimes
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
-
Ransomware Protection Playbook
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Date de publication: 2021-12-31
- Langue: Anglais
-
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The New World Economy
- A Beginner's Guide
- Auteur(s): Randy Charles Epping
- Narrateur(s): George Newbern
- Durée: 6 h et 49 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
As the global economic landscape shifts at an increasing rate, it's more important than ever that citizens understand the building blocks of the new world economy. In this lively guide, Randy Charles Epping cuts through the jargon to explain the fundamentals. In 36 engaging chapters, Epping lays bare everything from NGOs and nonprofits to AI and data mining. With a comprehensive glossary and absolutely no graphs, The New World Economy: A Beginner's Guide is essential listening for anyone who wants to understand what is going on in the world around them.
-
The New World Economy
- A Beginner's Guide
- Narrateur(s): George Newbern
- Durée: 6 h et 49 min
- Date de publication: 2020-01-21
- Langue: Anglais
-
As the global economic landscape shifts at an increasing rate, it's more important than ever that citizens understand the building blocks of the new world economy. In this lively guide, Randy Charles Epping cuts through the jargon to explain the fundamentals....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,48 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Start a Cybersecurity Consulting Business
- Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
- Auteur(s): VentureNest Books
- Narrateur(s): Andy David Jones
- Durée: 2 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.
-
How to Start a Cybersecurity Consulting Business
- Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
- Narrateur(s): Andy David Jones
- Durée: 2 h et 59 min
- Date de publication: 2025-04-18
- Langue: Anglais
-
In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing. Authored by seasoned cybersecurity experts, this comprehensive book provides an immersive journey through the critical principles, methodologies, and practical applications needed to navigate the CompTIA Pentest+ Certification.
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Date de publication: 2023-12-07
- Langue: Anglais
-
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses
- Basics and Guides for Dummies and Beginners
- Auteur(s): Perry S.
- Narrateur(s): Ben Herold
- Durée: 1 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This book is a good guide and provides basics on AI and cybersecurity to beginners and dummies. Also, it is helpful to answer questions of businesses like: How can one implement AI and cybersecurity in a company?, How and when can you link an AI?, and much more.
-
How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses
- Basics and Guides for Dummies and Beginners
- Narrateur(s): Ben Herold
- Durée: 1 h et 25 min
- Date de publication: 2021-04-12
- Langue: Anglais
-
This book is a good guide and provides basics on AI and cybersecurity to beginners and dummies. Also, it is helpful to answer questions of businesses like: How can one implement AI and cybersecurity in a company?, How and when can you link an AI?, and much more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
6,05 $ ou gratuit avec l'essai de 30 jours
-
-
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Auteur(s): Peter Aiken, Todd Harbour
- Narrateur(s): Susan Hanfield
- Durée: 9 h et 43 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance. Our Digital Civics Framework presents a guide to increasing the data literacy of billions of citizens. We outline the data knowledge that society needs and propose exercises that will help citizens interact productively within a data-driven society.
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Narrateur(s): Susan Hanfield
- Durée: 9 h et 43 min
- Date de publication: 2022-05-16
- Langue: Anglais
-
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Auteur(s): Perry Carpenter, Kevin Mitnick - foreword
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Version intégrale
-
Au global4
-
Performance4
-
Histoire4
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good book but....
- Écrit par Anonymous le 2025-07-04
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Date de publication: 2020-07-21
- Langue: Anglais
-
Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness training programs that drive secure behaviors and culture change....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- Auteur(s): Matthew K. Sharp, Kyriakos Lambros
- Narrateur(s): Christopher Grove
- Durée: 13 h et 7 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Informative Resource with Lackluster Storytelling
- Écrit par Alex le 2023-07-12
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- Narrateur(s): Christopher Grove
- Durée: 13 h et 7 min
- Date de publication: 2022-03-01
- Langue: Anglais
-
Learn to effectively deliver business aligned cybersecurity outcomes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- Auteur(s): Adam Segal
- Narrateur(s): Don Hagen
- Durée: 10 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- Narrateur(s): Don Hagen
- Durée: 10 h et 40 min
- Date de publication: 2016-02-18
- Langue: Anglais
- The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,96 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- Auteur(s): Anthony Hack
- Narrateur(s): Robert Plank
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- Narrateur(s): Robert Plank
- Durée: 3 h et 29 min
- Date de publication: 2020-03-25
- Langue: Anglais
-
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-